<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Whm on kalfaoglu.net</title><link>https://blog.kalfaoglu.net/tags/whm/</link><description>Recent content in Whm on kalfaoglu.net</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 04 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.kalfaoglu.net/tags/whm/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-41940: The cPanel Zero-Day That Sat Unpatched for Two Months</title><link>https://blog.kalfaoglu.net/posts/2026-05-04-cpanel-auth-bypass-zero-day-en/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><guid>https://blog.kalfaoglu.net/posts/2026-05-04-cpanel-auth-bypass-zero-day-en/</guid><description>&lt;p&gt;On April 28, 2026, cPanel released an emergency patch for &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-41940"&gt;CVE-2026-41940&lt;/a&gt; — a CVSS 9.8 authentication bypass that, as it turned out, attackers had been quietly exploiting since approximately February 23. That is roughly two months of zero-day exposure across an estimated 1.5 million internet-facing cPanel &amp;amp; WHM instances. CISA promptly added it to its Known Exploited Vulnerabilities catalog, which is the agency&amp;rsquo;s way of saying: stop reading and go patch.&lt;/p&gt;</description></item></channel></rss>